In the Linux kernel, the following vulnerability has been resolved: crypto: aspeed - fix double free caused by devm The clock obtained via devmclkgetenabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clkdisableunprepare() in error path and remove function causes double free. Remove the manual clock cleanup in both aspeedacryprobe()'s error path and aspeedacry_remove().